| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | — | conf |
ISSCC
|
| 2025 | J | jnl |
CoRR
|
| 2024 | — | conf |
ISSCC
|
| 2013 | — | ch. |
Handbook of Signal Processing Systems
|
| 2012 | J | jnl |
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs.
Pers. Ubiquitous Comput.
|
| 2011 | J | jnl |
IEEE Multim.
|
| 2010 | — | ch. |
Towards Hardware-Intrinsic Security
|
| 2010 | — | ch. |
Secure Integrated Circuits and Systems
|
| 2010 | — | conf |
WISEC
|
| 2010 | C | conf |
ISC
|
| 2010 | — | ch. |
Handbook of Signal Processing Systems
|
| 2010 | — | conf |
MOBILIGHT
|
| 2009 | A* | conf |
SIGIR
|
| 2008 | J | jnl |
J. Signal Process. Syst.
|
| 2008 | J | jnl |
IEEE Trans. Computers
|
| 2008 | — | conf |
ASAP
|
| 2007 | Misc | conf |
WISA
|
| 2007 | Misc | conf |
WISA
|
| 2006 | — | conf |
ASAP
|